نتایج جستجو برای: common identity

تعداد نتایج: 792664  

ژورنال: رویش روانشناسی 2016
بهرامی احسان, هادی, حاتمی, جواد, حسینی, سید محمد مهدی, رحیمی نژاد, عباس, شریف زاده, مسعود, شفیعی, رزا,

The aim of this study was to determine the arrangement of religion and the modern youth identity and its relation to the well-being. For this purpose, 360 youth participated in the study. The method of sampling was convenience. Modern identity questionnaire, Islamic identity questionnaire, identity processing style (ISIG3 Berzonsky, 1992) and The satisfaction with life scale (Diener, E. D., & e...

Journal: :international journal of architecture and urban development 2013
zohreh torabi yalda sima

identity, a series of traits and characteristics that makes a person or a member of the community come to a kind of “ recognition” about individuals and other communities; the city also, following the example of this criterion gains character and gets independent. identity in the city, through the creation and association with “public memories” of citizens causes the sense of interest and depen...

Journal: :Educational Philosophy and Theory 2018

Journal: :Neuroscience and biobehavioral reviews 2012
Sarah Weigelt Kami Koldewyn Nancy Kanwisher

Face recognition--the ability to recognize a person from their facial appearance--is essential for normal social interaction. Face recognition deficits have been implicated in the most common disorder of social interaction: autism. Here we ask: is face identity recognition in fact impaired in people with autism? Reviewing behavioral studies we find no strong evidence for a qualitative differenc...

2007
Manuel Sáchez Cuenca Gabriel López Millán Óscar Cánovas Reverte Antonio F. Gómez-Skarmeta

Identity federations are emerging in the last years in order to make easier the deployment of resource sharing environments among organizations. One common feature of those environments is the use of access control mechanisms based on the user identity. However, most of those federations have realized that user identity is not enough to offer a more grained access control and value added servic...

2016
Nick Hopkins Stephen D. Reicher Sammyh S. Khan Shruti Tewari Narayanan Srinivasan Clifford Stevenson

We investigated the intensely positive emotional experiences arising from participation in a large-scale collective event. We predicted such experiences arise when those attending a collective event are (1) able to enact their valued collective identity and (2) experience close relations with other participants. In turn, we predicted both of these to be more likely when participants perceived c...

پایان نامه :دانشگاه بین المللی امام خمینی (ره) - قزوین - دانشکده معماری و شهرسازی 1393

چکیده نمایشگاه های جهانی یا اکسپو عنوانی ست که از سال 1851 میلادی در لندن توسط همسر ملکه انگلستان شکل گرفت ، هدف اولیه این نمایشگاه ها نمایش دستاورد های صنعتی بود، اما در طول 165 سال که این نمایشگاه های برگزار گردیدند ، رویکرد آنها تغییر کرده است . در هر دوره به یک شعار که در واقع دغدغه اصلی جهان، در آن زمان بوده است ، پاسخ داده شده و راه حل کشور های مختلف در مورد آن موضوع به نمایش گذارده شد...

2002
Agus Sudjianto

Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting methods determine modularization based upon functional concerns. Brand identity is additionally determined by sensory aesthetics. We introduce three architecting rules to mai...

Journal: :Journal of Multimedia 2014
Lihua Zhang Xichang Dai Youjin Shen

In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint US...

Journal: :Journal of Multimedia 2014
Zhongsheng Qiu Fangfang Zhang Yuan Zhou

In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint US...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید